|
|
Subscribe / Log in / New account

Mageia alert MGASA-2020-0093 (patch)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2020-0093: Updated patch packages fix security vulnerabilities
Date:  Sat, 22 Feb 2020 00:07:08 +0100
Message-ID:  <20200221230708.1D1069F641@duvel.mageia.org>

MGASA-2020-0093 - Updated patch packages fix security vulnerabilities Publication date: 21 Feb 2020 URL: https://advisories.mageia.org/MGASA-2020-0093.html Type: security Affected Mageia releases: 7 CVE: CVE-2019-13636, CVE-2019-13638, CVE-2018-20969 Description: Updated patch package fixes security vulnerabilities: * In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. (CVE-2019-13636). * A vulnerability was found in GNU patch through 2.7.6 is vulnerable to OS shell command injection that can be exploited by opening a crafted patch file that contains an ed style diff payload with shell metacharacters (CVE-2019-13638). * A vulnerability was found in do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter (CVE-2018-20969). References: - https://bugs.mageia.org/show_bug.cgi?id=25279 - https://lists.fedoraproject.org/archives/list/package-ann... - https://access.redhat.com/errata/RHSA-2019:2798 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2... SRPMS: - 7/core/patch-2.7.6-4.1.mga7


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds